On 2026/02/18 15:00, Panu Matilainen wrote:
On 2/18/26 2:27 PM, Cristian Le via devel wrote:
On 2026/02/11 16:06, Panu Matilainen wrote:

Hi Panu,

I can now confirm that we are indeed hitting this issue. Afaik we did set gpgcheck=0, and I am now digging into the code to confirm this.

Here are some failed jobs to reference:
- Copr artifact: https://artifacts.dev.testing-farm.io/ d3f1db58-2964-42d0-be60-9c6023d6acd4/ (inside "Copr build(s) installation" -> "6-Install-pakcages.txt") - Koji artifact: https://artifacts.dev.testing-farm.io/ a33f815a-9021-42d0-8fa5-8afefcc8da44/

Also see the "4-Add-repository.txt" I do see `gpgcheck=0`.

Okay so here at least, the issue is that the package file that is failing the check is specified on the command line directly, so no repository configuration affects that.
Thanks, I've highlighted that issue. It is partly an implementation issue because we are somehow trying to make sure the exact rpms are being used instead of relying on the priority, --from-repo, etc. flags. We'll keep that in mind in the redesign.
Note that this package IS signed, it's just that the key is not imported:
- package python3-scikit-build-core-0.11.6-1.20260217085946639536.pr1219.48.g8dce8a6.fc45.noarch does not verify: Header OpenPGP V4 RSA/SHA256 signature, key ID e2b551f502810203: NOKEY

The test is downloading the copr repo definition which includes the key info as well: gpgkey=https://download.copr.fedorainfracloud.org/results/packit/scikit-build-scikit-build-core-1219/pubkey.gpg

Thanks, it seems that that is not set properly, will try to see if we can add it for the future.
The brute-force variant is of course to just disable signature checking for that bit.

One would expect --setopt=localpkg_gpgcheck=false to the command line bypass that, but that doesn't seem to work. Which would be a dnf bug.
I'll have a look.

Hmm, that goes for --no-gpgchecks as well. Which was intentional back in 2018 but not so much now.
Hmm, but are all installation from @Commandline supposed to be signed and checked with the new change proposal?
To workaround, override the rpm policy in the test running environment, as per the change docs:

    # echo '%_pkgverify_level digest' > /etc/rpm/macros.verify
This might be the best approach. Just to double check, `/etc/rpm/macros.verify` was something that was newly introduced with this proposal and it is ok to completely overwrite it?
--
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://forge.fedoraproject.org/infra/tickets/issues/new

Reply via email to